Implementing Cisco Network Security (IINS v3.0) (#1)

In which two models can the Cisco Web Security Appliance be deployed? (Choose two.)

as a transparent proxy using the Secure Sockets Layer protocol
as a transparent proxy using the HyperText Transfer Protocol
explicit active mode
as a transparent proxy using the Web Cache Communication Protocol
explicit proxy mode